When good becomes evil: Tracking bluetooth low energy devices via allowlist-based side channel and its countermeasure

Y Zhang, Z Lin - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
Bluetooth Low Energy (BLE) is ubiquitous today. To prevent a BLE device (eg, a
smartphone) from being connected by unknown devices, it uses allowlisting to allow the …

Sneaky spy devices and defective detectors: the ecosystem of intimate partner surveillance with covert devices

R Ceccio, S Stephenson, V Chadha… - 32nd USENIX Security …, 2023 - usenix.org
Recent anecdotal evidence suggests that abusers have begun to use covert spy devices
such as nanny cameras, item trackers, and audio recorders to spy on and stalk their …

Ghost Peak: Practical Distance Reduction Attacks Against {HRP}{UWB} Ranging

P Leu, G Camurati, A Heinrich, M Roeschlin… - 31st USENIX Security …, 2022 - usenix.org
We present the first over-the-air attack on IEEE 802.15. 4z High-Rate Pulse Repetition
Frequency (HRP) Ultra-Wide Band (UWB) distance measurement systems. Specifically, we …

AirGuard-protecting android users from stalking attacks by apple find my devices

A Heinrich, N Bittner, M Hollick - … of the 15th ACM Conference on …, 2022 - dl.acm.org
Finder networks in general, and Apple's Find My network in particular, can pose a grave
threat to users' privacy and even health if these networks are abused for stalking. Apple's …

Track you: A deep dive into safety alerts for apple airtags

N Shafqat, N Gerzon, M Van_Nortwick, V Sun… - Proceedings on Privacy …, 2023 - par.nsf.gov
Bluetooth-based item trackers have sparked apprehension over their potential misuse in
harmful stalking and privacy violations. In response, manufacturers have implemented safety …

Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection

A Heinrich, L Würsching, M Hollick - Proceedings on Privacy …, 2024 - petsymposium.org
While designed to locate lost items, Bluetooth trackers are increasingly exploited for malign
purposes, such as unwanted location tracking. This study probes deeper into this issue …

AirTag of the clones: shenanigans with liberated item finders

T Roth, F Freyer, M Hollick… - 2022 IEEE Security and …, 2022 - ieeexplore.ieee.org
AirTags are the first standalone devices that support Apple's Find My network. Besides being
a low-cost item finder, they provide an exciting research platform into Apple's ecosystem …

Blind My-An Improved Cryptographic Protocol to Prevent Stalking in Apple's Find My Network

T Mayberry, EO Blass, E Fenske - Proceedings on Privacy …, 2023 - petsymposium.org
In 2020, Apple introduced the Find My protocol, which allows owners to crowdsource the
location of their lost Apple devices even when the lost device has no active internet …

TagAlong: Free, Wide-Area Data-Muling and Services

A Bellon, A Yen, P Pannuto - … of the 24th International Workshop on …, 2023 - dl.acm.org
We demonstrate how to leverage Apple's Find My protocol, most well known as the
underlying protocol of the AirTag, for arbitrary data-muling and location services. This …

Understanding Women's Perspectives on Smart Home Security Systems in Patriarchal Societies of Malawi.

GH Chidziwisano, M Jalakasi - Proceedings of the 2023 ACM Designing …, 2023 - dl.acm.org
According to the World Bank, 33% of women in Sub-Saharan Africa experience domestic
violence due to men's social status over them. Prior research suggests that smart home …